You are here

IT Security from Kassel in Hessen

Our local security office is located in Kassel, Hessen - Germany. The Evolution Security GmbH pentest- & apt core research -team is a trusted source for big companies, instituts or the industry. We grant secrecy, privacy, reliability & confidentiality to all of our clients & partners. Our services are offered from germany to the public european industry & different international parties.

24/7h Availability of our Services

The Evolution Security GmbH team is 24/7h available for customers, members and of course to important clients. The administration is available as first representative of the security company and the first instance to customers or clients. Contact our representatives only with a special reason, for security job offers, an invitation to conference/event, important customer and client requests.Feel free to read the service documents via rss xml feed or contact us.

Contact the Evolution Security Company

This website is a project of the "Evolution-Security GmbH" and was founded in 1997 in Europe. The official security company has been registered in 2008 and became a GmbH in 2014. Questions about the content, pentest offers, press, commercials or partnerships? Feel free to contact our cooperative company support team to find a solution or to receive an answer. Questions regarding articles, advisories or upcoming vulnerabilities to the core research team.

Exploitation (Simulation)

Exploitation - Test Simulation

The exploitation phase is the third step of the test simulation procedure. In the exploitation phase the researchers and pentesters take action by actively exploitation of security flaws, well know vulnerabilities, 0day vulnerabilities and security weaknesses. Our top researchers combine to manual and automatic exploitation methods to successful goal.

Development - Exploits & Proof of Concepts

In the exploitation phase our security researchers and penetration testers develop own exploits to bypass or evade filters but also to unauthorized gain system access by own discovered zero-day vulnerabilities. Once our researchers against unauthorized system access to a first or main system the possibility popups up to continue the exploitation procedure with the followup target systems. In the exploitation phase our researchers attack the computer systems with high experience and of course our own software, scripts or programs.

Public Bugs - Exploits & Proof of Concepts

We are also able to use public vulnerability reports, poc and exploits to successful detect vulnerabilities in customer infrastructures but our main priority on testings is to discover zero-day (unknown) vulnerabilities. The evolution security team is also watching and monitoring public information about public vulnerabilities or bugs to grant our clients/customers an all around exploitation simulation.

Re-enter of Reconnaissance & Enumeration
In the exploitation phase the researchers and penetration testers have ever the ability to re-enter the reconnaissance or enumeration phase to capture new targets and also to extend running tests.

Next Phase - Documentation

After the exploitation -phase, we are prepared for the documentation and ending phase of the simulation. Watch as next step the documentation phase.